Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and...

27
1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world” Benoît Dupont 1 , Anne-Marie Côté 1 , Jean-Ian Boutin 2 , and José Fernandez 3 American Behavioral Scientist, 2017, Vol. 61 (11), pp. 1219-1243, Reprinted by permission of SAGE Publications, http://journals.sagepub.com/doi/abs/10.1177/0002764217734263. Abstract This article explores the social and market dynamics of Darkode, an invitation-only cybercrime forum that was dismantled by the FBI in July 2015 and was described by a U.S. Attorney as “the most sophisticated English-speaking forum for criminal computer hackers in the world”. Based on a leaked database of 4788 discussion threads, we examine the selection process through which 344 potential new members introduced themselves to the community in order to be accepted into this exclusive group. Using a qualitative approach, we attempt to assess whether this rigorous procedure significantly enhanced the trust between traders, and therefore contributed to the efficiency of this online illicit marketplace. We find that trust remained elusive and interactions were often fraught with suspicion and accusations. Even hackers who were considered successful faced significant challenges in trying to profit from the sale of malicious software and stolen data. Keywords Internet, malicious hackers, malware, illicit online markets, trust Corresponding Author Benoît Dupont, CICC / UdeM, Pavillon Lionel Groulx, CP 6128 succursale Centre-Ville, Montreal (QC) H3C 3J7, Canada Email: [email protected] 1 Université de Montréal, Montreal, QC, Canada 2 ESET, Montreal, QC, Canada 3 École Polytechnique de Montréal, Montreal, QC, Canada

Transcript of Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and...

Page 1: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

1

Darkode:Recruitmentpatternsandtransactionalfeaturesof“themostdangerouscybercrimeforumintheworld”BenoîtDupont1,Anne-MarieCôté1,Jean-IanBoutin2,andJoséFernandez3AmericanBehavioralScientist,2017,Vol.61(11),pp.1219-1243,ReprintedbypermissionofSAGEPublications,http://journals.sagepub.com/doi/abs/10.1177/0002764217734263. AbstractThisarticleexploresthesocialandmarketdynamicsofDarkode,aninvitation-onlycybercrimeforumthatwasdismantledbytheFBIinJuly2015andwasdescribedbyaU.S.Attorneyas“themostsophisticatedEnglish-speakingforumforcriminalcomputerhackersintheworld”.Basedonaleakeddatabaseof4788discussionthreads,weexaminetheselectionprocessthroughwhich344potentialnewmembersintroducedthemselvestothecommunityinordertobeacceptedintothisexclusivegroup.Usingaqualitativeapproach,weattempttoassesswhetherthisrigorousproceduresignificantlyenhancedthetrustbetweentraders,andthereforecontributedtotheefficiencyofthisonlineillicitmarketplace.Wefindthattrustremainedelusiveandinteractionswereoftenfraughtwithsuspicionandaccusations.Evenhackerswhowereconsideredsuccessfulfacedsignificantchallengesintryingtoprofitfromthesaleofmalicioussoftwareandstolendata.KeywordsInternet,malicioushackers,malware,illicitonlinemarkets,trustCorrespondingAuthorBenoîtDupont,CICC/UdeM,PavillonLionelGroulx,CP6128succursaleCentre-Ville,Montreal(QC)H3C3J7,CanadaEmail:[email protected]

1UniversitédeMontréal,Montreal,QC,Canada2ESET,Montreal,QC,Canada3ÉcolePolytechniquedeMontréal,Montreal,QC,Canada

Page 2: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

2

IntroductionOn 15 July 2015, the FBI and the U.S. Department of Justice announced the takedown of acomputerhackingforumknownasDarkode,whichledtotheindictmentof12suspectsandthearrest of 70 other members across 20 countries (Zetter, 2015). U.S. Attorney David HicktondescribedDarkodeas“…oneofthegravestthreatstotheintegrityofdataoncomputersintheUnitedStatesandaroundtheworldand…themostsophisticatedEnglish-speaking forumforcriminalcomputerhackersintheworld”(FBI,2015).Europol’sslightlylessdramaticmediareleasestated that Darkode was “the most prolific English-speaking cybercriminal forum to date”(Europol, 2015). Darkode was certainly not the first online illicit marketplace to attract theinterestoflawenforcementagenciesandtobetakendownfollowingalong-lastinginfiltrationoperation(Ablonetal.,2014),butthefactthatitwasaccessibleonlybyinvitationandclaimedtocatertoasmallbutexclusivecommunityofelitemalicioushackersmakesituniquelyinterestingforresearchers.

Mostofthescientificliteratureonmalicioushackersandtheillicitdigitalmarketplacesonwhich they converge to exchange knowledge, find new co-offenders, and trade maliciousmalware,criminalservices,andstolendatareliesheavilyondataculledfromeasilyaccessiblepublic or semi-public online forums. Lacking technical skills and criminal contacts, aspiringmalicioushackersenduponforumsthatareeasytofindandwelcomeanyone;theseforumsarealsoeasierforacademics,boundbytherigorousconstraintsofresearchethicsboards,tostudy.Unfortunately,mostsuchforumssufferfromastructuraltrustdeficit(Dupontetal.,2016)andservelargelyasfertilehuntinggroundswherecunning“rippers”takeadvantageofthegullibilityofnovices(HerleyandFlorêncio,2010).Themostexperienced,skilled,andsuccessfulhackersplytheirtradeoncloselyguardedinvitation-onlyforums,whicharealmostimpossibleforacademicstostudyethically,makingitextremelydifficulttolearnmoreaboutthedynamicsofthesethrivingmarketplaces.Mostoftheknowledgeaboutthemcomesfromjournalisticinvestigations,whichemphasizethehumaninterestaspectsofthisrapidlyexpandingundergroundeconomy(Glenny,2011;Poulsen,2011;Krebs,2014)andareunderstandablymore interested in chronicling theexperiencesofhighprofilehackersthanprovidingacomprehensiveanalysisofthenatureandstructureoftheirillicitexchanges.Thisknowledgegapisregrettable,asthevolumeandimpactofonlineharmsareclearlyontheincreaseaccordingtothelateststatisticaldataavailablefromtheU.K.,which istheonly jurisdictionthathasaddedonlinecrimesto itsvictimizationsurvey(OfficeforNationalStatistics,2016),andnowrepresentthemainformofcriminaloffenceagainstbothorganizationsandindividuals.

However,onrareoccasionshighlysecuredillicitonlineforumsarehackedbycompetitorsorvigilantesandthecontentoftheseforumsispubliclyreleased.On1April2013,aFrenchbloggerusing the alias “Xylitol” released a cache of 4788 files taken fromDarkode that exposed theforum’smembership,productsandservicesforsale,andvariousdiscussionsoverthepreviousfouryearsbetweensomeoftheworld’smostprolificmalicioushackersandprogrammers.Thisarticle provides the first analysis to date of these files and examines the specific social andbusinessdynamicsofwhatwasforatimeaveryactivedigitalconvergencesettingforsuccessfulonlineoffenders.Therecoursetosuch“found”datadoesraisesomeethicalanddata-reliabilityissues(McCoyetal.,2012).However,althoughit’simpossibletoentirelyexcludethepossibilitythat some of the files were forged in an effort to implicate particular members, the efforts

Page 3: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

3

required to generate hundreds or thousands of fake discussion threads would bedisproportionate to theexpectedbenefits. Furthermore,ahighly respected journalistwithanintimateknowledgeofthecybercrimeundergroundreviewedthefilesandfoundnoreasontoquestiontheirreliability(Krebs,2013a).Ethicaluseofthisdatawasgreatlyfacilitatedbytheirformat,which ensured thatmetadata or other types of identifying information could not beinadvertently obtained and shared. As well, Darkode members used only aliases and wereextremelyprudentintheiroperationalsecuritypractices,makingitimpossibletoguesstheirrealidentity,exceptinthecaseofthosewhowerearrestedintheFBItakedownandnamedintheindictmentsthatfollowed.

WewereparticularlyinterestedintheDarkodeselectionprocess,duringwhichpotentialnewmembers introduced themselves to the communityasa first step tobeingaccepted into thisexclusivegroup.Usingaqualitativeapproach,weattemptedtoassesswhetherthisapparentlystringentprocedure significantlyenhanced trustbetween traders, therebycontributing to theefficiencyof this illicitonlinemarketplace. In the first section,weprovideanoverviewof thecriminology and computer science literature on online illicitmarkets and the trust dilemmasafflictingthem.Inthesecondsection,wegiveashorthistoryofDarkodebeforedescribinginathirdsectionthedataweusedandtheanalysesweperformed.Thefourthsectionexaminesthepresentational strategiesof344candidatesattempting to join the forumand theoutcomeoftheseapplications.Therelevanceofpersonalconnections,pastexperiences,technicalskills,andbusinessinterests,includingproductsandservicesavailableforsale,arediscussed.Finally,basedontwocasestudies,afifthandfinalsectioncastsnewlightonthechallengesfacedbycybercrimeentrepreneursdealingwithdemandingcustomerswhodonothesitatetoleakthemalwaretheyhavejustpurchasedtothebroaderhackingcommunity,significantlyerodingtheprofitabilityofsuchendeavors.Malicioushackers,illicitmarkets,andtrustasacooperativeenablerforcriminalachievementWhilemostcriminalonlinemarketsoperateasvirtualopen-airbazaars,withverylowentrybarriersinanattempttoattractanyonewithaninterestinbuyingorsellingmalwareorstoleninformation,afewofthemhaveadoptedadifferentmodelandfunctionasprivateclubs,accessibletomembersbyinvitationonly(Holt,2013).Abroadoverviewofwhatweknowaboutonlineillicitmarketsandtheirfailuresisneededtounderstandwhythiscounter-intuitiveapproachissensible. Themainpurposeofanonlineillicitmarketistoconnectsellersandbuyerstoallowthemtotradeinthebroadrangeofproductsandservicesthatallowthemtoexecuteandprofitfromtheircriminalprojects.Theglobalnatureofonlinecrimegeneratestremendousopportunitiesformalicioushackersbyprovidingaccesstoanunprecedentedlylargepoolofvictims(bothmachinesandhumans).However,identifyingandrecruitingco-offenderswhomasterthehighlyspecializedtechnicalskillsrequiredtocarryoutcomplexdigitaltheftandfraudschemesrepresentsachallenge.Toconnectthesupplyanddemandofsuchexpertise,onlineillicitmarketsoffervirtualconvergencesettingswhereoffenderscancongregate,developrapport,andforgeprofitablebusinesstieswithaccomplices(Felson,2003;Soudijn&Zegers,2012;Leukfeldtetal.,2016a;Macdonald&Frank,2016).OnlineillicitmarketsoperateontechnologicalplatformsthatincludeInternetRelayChat(IRC)channels(synchronous),web

Page 4: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

4

forums(asynchronous),and,morerecently,theOnionRouter(Tor)network(DécaryHétuandGiommoni,2016).Transactionsareoftencompletedviaprivatemessagingtoolstoensuretheconfidentialityofnegotiations(Holt,2013;Yipetal.,2013).Theseplatformsalsoplayasignificantknowledgetransferfunction(Soudijn&Zegers,2012),replacingprisonsasthe“universityforcybercriminals”(Leukfeldtetal.,2016a). Overthepastfewyears,agrowingbodyofknowledgehasbeguntoprovideabetterunderstandingofthesemarkets’structureandsocialorganization,withaparticularemphasisonforums.Yipetal.(2013a;2013b)identifiedfourmainfeaturesthatmakeforumssoattractivetocybercriminals:formalcontrolandcoordinationmechanisms,socialnetworkingopportunities,andmethodstohelpmitigatebothidentityandqualityuncertainty.HoltandLampke(2010)usedqualitativeanalysistodescribethetypesofinformationandservicesforsaleonsuchmarkets,thepriceandquantitiesavailable,andtheforces(communications,price,quality,andservice)thatinfluencetransactions.Holt(2013)appliedtheorganizationalframeworkdevelopedbyBestandLuckenbill(1994)toshowhowtheorganizationalcomplexityofcybercrimeforumsvaries,rangingfrominformalgroupsofcolleaguestomorestructuredorganizations,andhowtheyfacilitateadivisionoflabor.Severalresearchershavealsousedsocialnetworkanalysis(SNA)methodologiestounderstandthestructuralpropertiesofcybercrimeforumsandthetiesthatbindtheirmembers,oftenusingtheseinsightstosuggestoptimizeddisruptionstrategies(Luetal.,2010;Motoyamaetal.,2011;Yipetal.,2012;Monsmaetal.,2013;Décary-HétuandLaferrière,2015;MacdonaldandFrank,2016).Finally,afewresearchershaveappliedthecrimescriptanalysisapproach,usedbysituationalcrimepreventionscholarstobreakdowntheflowofactionsinvolvedincommittinganoffence,totheonlinesettingsofcybercrimeforums(SoudijnandZegers,2012;HutchingsandHolt,2015;HutchingsandHolt,2016),shiftingthefocusofdisruptionstrategiesfromindividualnodestospecifictasksandfunctions. Oneofthemajorfeaturesofcybercrimeforumsistheinherentmistrustthatcharacterizesinteractionsbetweenmemberswhotradeindeception.HerleyandFlorêncio(2010)wereamongthefirsttoexpressskepticismabouttheprofitabilityofthemostcommonformsofhackingandonlinefraud,notingthatillicitmarketsarecrowdedwithrippers–marketparticipantswhodonotdelivertheproductsandservicesforwhichtheyhavebeenpaid,orwhosupplyproductsofalesserqualitythanwhattheyhadpromisedbuyers.Rippersareubiquitousonillicitmarketsandcreateuncertaintyandparanoiathathindersthenaturalflowoftransactions.Theremaybeahighlevelofactivityonopenonlineillicitmarkets,butthelevelofactivitydoesnotensuregreateconomicperformance.SuchmarketshavebeencomparedtothefamousmarketforlemonsfirsttheorizedaboutbyAkerlof(1970),whereinformationasymmetrybetweenbuyersandsellersdistortsthepricesandproducessuboptimaloutcomesforhonesttraders. Inordertofacilitatedetectionofripperssothattheycanbeexcludedfromcybercrimeforums,administratorshaveimplementedabroadrangeofcontrols,regulations,andreputationmanagementtoolsinspiredbythesolutionsdevelopedbye-commerceplatforms(Lusthaus,2012;SoudijnandZegers,2012;Yipetal.,2013b;Holtetal.,2015).Theserisk-reductionstrategiesareintendedtobuttresstrustandmakemarketsmoreefficient,butpreliminaryevidencefromtheworld’slargesthackingforumindicatesthattheydonottranslateintothesemarketsaseasilyashadbeenhoped(Dupontetal.,2016).Ithasbeensuggestedthat

Page 5: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

5

themosteffectivewaytoovercomethistrustdilemmawouldbetoeitherraisethecostofparticipationinordertodeterrippers(Afrozetal.,2013)or,moredrastically,tolimitmembershiptoasmallgroupofreliableparticipants(Yipetal.,2013b).Alimitednumberofcybercrimeforumshaveadoptedanexclusivemodel(Ablonetal.,2014).Whileweknowrelativelylittleabouttheeconomicperformanceofcybercrimeforums,thecriminalachievementsofthosewhopatronizethem(Franklinetal.,2007;McCoyetal.,2012;Allodietal.,2016;Décary-HétuandLeppänen,2016;Holtetal.,2016),orwhatmakesthesemarketssustainable(Afrozetal.,2013),itcertainlyseemspossiblethatahand-pickedgroupofskilledandexperiencedhackerswouldtrademuchmoreeffectivelyandefficientlythanalargecommunityofself-selectedmemberscomprisedmainlyofnovicesorindividualswithverylimitedtechnicalandmonetaryskills.Mostoftheavailableliteratureononlineillicitmarketshasreliedonempiricaldatacollectedfrompubliclyaccessibleforums,withasmallersampleofstudiesusingregistration-onlyforums,whichrequireaself-selectedpasswordandarenotindexedbymainstreamsearchengines(Holt,2016).Tothebestofourknowledge,noresearchhasyetanalyzedtheadmissionandmarketdynamicsofaninvitation-onlyforum,themaincontributionsofthepresentarticle,whichdiscussesdataobtainedfromDarkode.AshorthistoryofDarkodeIntheabsenceofofficialrecordsandreliablearchives,documentingthehistoryofonlineillicitforumsisachallenge.TheiradministratorsgenerallytrytoevadetheattentionofoutsidersandlawenforcementinvestigatorsbylimitingaccesstocontentpostedbymembersandavoidingindexingbysearchenginesthroughtheuseofanindustrystandardknownastheRobotsExclusionProtocol(or‘robots.txt’command),whichletssearchenginesknowthatthecollectionofdatafromsomewebpagesshouldbeavoided(Koster,1996),orbyusingpassword-protectedlandingpagesthatblockaccesstoawebsite.Unlessaresearcherhasbeengrantedaccesstoanillicitforumfromearlyinitsexistenceorhasbeenabletoretrospectivelyandcomprehensivelydownloaditscontents,shemustrelyonthirdparties,suchasjournalists,securitybloggers,andeventuallyhackersthemselves,inanyattempttounderstandthereasonsandconditionsthatledtothecreationanddevelopmentofsuchonlinecriminalmarketplaces. Accordingtosuchthird-partysources,DarkodewaslaunchedinMarch2008byaSlovenianhackernamedMatjažŠkorjancandanAmericanhackernamedDanielPlacek.ŠkorjanchadcodedandmarketedtheMariposabotnet,apowerfulpieceofmalwarethatatitspeakphasemanagedtoenslavecloseto13millioncompromisedcomputers(BBC,2013),whilePlacekwasmoreinterestedinprogrammingcredential-sniffingsoftware(Hrodey,2015).AccordingtoPlacek’sverycandidrecollection,theirintentwasto:“Startalittlecommunity,invite-only…wherewecouldgetsomelike-mindedpeopletogetherandreallyjusttalk[aboutmalicious]code…Wedon’twantthescriptkiddies,peoplewhoarejustusingthesetoolbutdon’treallyunderstandthem.Let’sgetthepeoplewhoarereallymakingthestuff…Westarteditupandinvitedafewpeoplethatwealreadyknew…chattingaboutcode,sharingalittlebitofcode…Initially,itwasaprettysmallgroup,lessthan25.Dayone,itwasfivepeopleorsomething,anditgrewovertime.Wetalkedabouttheprojectswewereworkingon,wetalkedaboutideas,talkedaboutsomeofthedifferenttechnologies”(Placek,2016). Thecommunitybenefitedindirectlyfromtakedownsofanumberofpubliccybercrimeforums

Page 6: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

6

thatlefthackerswithlimitedoptionsforforumstotradetheirwares.ThefactthatDarkodehadadoptedaninvitation-onlypolicybecameanattractivefeaturethatgaveitaveneerofexclusivityandcontributedtoaquickriseinpopularity.Simultaneously,existingmembersdecidedtobringinbuyers.InPlacek’swords,“wehadthesepeoplewhowerecreatingthings,andsomeofthemhadsomecustomersthattheyworkedwithalready,andtheywantedtobringthemonthereandbeabletoselltothemthroughthatplatformaswell”(Placek,2016).Effortsweremadetodividethesiteintosectionsthatwereaccessibletomembersaccordingtotheirleveloftechnicalexpertise,withsomesectionsreservedfortheprogrammerswhoweremostskilledatdevelopingmalware.Onhisownadmission,PlacekwasnotassuccessfulanentrepreneurashisassociateŠkorjanc,whomanagedtosellhisbotnetcodetoafewhundredpeoplefor$500to$2,000apiece(Krebs,2015).Bothofthemdisengagedfromtheforumin2010:PlacekafewmonthsbeforehisarrestbytheFBI(hisarrestwasnotmadepublicuntil2015,andhecollaboratedwiththelawenforcementagencyduringthosefiveyears)(Hrodey,2015),andŠkorjancfollowinghiscapturebytheSlovenianpoliceinJuly2010(FBI,2010). ASwedishhackernamedJohanAndersGudmunds,whousedtheonlinealiasesofMafi,CrimandSynthet!c,tookovertheforum’sadministrationresponsibilities,withthehelpofanothermemberwhousedthealiasFubar.Bothhackershaddevelopedandweresellingmalwarethatallowedotherstobuildandoperatebotnets(theCrimepackexploitkitforCrimandtheNgrbotmalwareforFubar)(Krebs,2015).Theforum’scontinuousgrowthattractedsuccessfulRussianhackerssuchasAlexUdakov,Gribodemon,orPaunch,whohaddevelopedpopularandeasy-to-usemalwarepackagessuchasthePhoenixexploitkit,theSpyEyetrojan,ortheBlackholeexploitkit.Butthishighprofilemembershipalsoattractedtheattentionoflawenforcementinvestigatorsandsecurityresearchers,whoinfiltratedtheforumtocollectintelligence,creatingasenseofparanoiaamongmembersandleadingitsadministratorstoaggressivelybansuspiciousaccountsandtightenadmissioncriteria(MalwareTech,2014;Krebs,2015). InJanuary2013,anewadministrator,nicknamedSp3cial1st,whohadbeenoneoftheforum’searlymembers,haddonebusinesswithasignificantshareoftheforum,andhadareputationforspendingagreatmanyhoursonline,wasvotedin.Heproceededtovastlyexpandtheforum’smembershipbyadvertisingonbeginnerforumssuchasHackForumsandbysendingunsolicitedemailstothemembersofoldhackingforums(Xylitol,2013;MalwareTech,2014).ThisbroadrecruitmentdriveattractedamorediversesetofhackerstoDarkode,includingsomewhoactivelysoughtthemedia’sattentionthroughveryhighprofileattacks.TheLizardSquadcrew,whichgainednotorietyinDecember2014foritsDistributedDenialofServiceattacksagainstMicrosoftXboxandSonyPlaystationservers,wreckingChristmasformillionsofvideogameplayers,isrepresentativeofthisnewwaveofDarkodemembers(Turton,2015). Asitsstatusroseamongelitehackers,Darkodewasregularlyinfiltratedbysecurityprofessionals,whousedtheiraccesstomonitormembersandtheirdealings.On1April2013,aFrenchwhite-hathackerknownasXylitol,whohadestablishedareputationasatechnicallysophisticatedvigilantebentondisruptingcybercrimeactivities,releasedmostoftheforum’scontentsafteroneofitsmembersusedXylitol’shandletoconductillegalbusinessonline(Krebs,2011;Xylitol,2013;Pauli,2013;Hrodey,2015).Xylitol’sleakdidnot,however,preventDarkodefromremainingathrivingmarketplaceuntilitstakedownbytheFBI.Followingtheforum’stakedowninJuly2015,Sp3cial1st,whohadavoidedarrest,attemptedtomovetheforumtoamoresecureinfrastructurethatreliedontheobfuscationtechnologiesofthedarkweb,suchas

Page 7: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

7

theTornetwork,buttheresurrectedforumwaspoorlysecuredandfailedtoregainthetrustofpastmembers(Kharouni,2015). UsinghackerleakstostudycybercrimeThedataleakedbyXylitolprovidesauniquewindowintothesustainedinteractionsofacommunityofveryactiveandundeniablymalicioushackers.Althoughthematerialwasinitiallymeanttoexposeandembarrassthemembersofthiscommunity,suchaleakalsoprovidesresearcherswithhighqualitysecond-handmaterialthattheywouldhavedifficultycollectingthemselves—forbothtechnicalandethicalreasons—enablingthemtounderstandthesocialandbusinessdynamicsofthesegroups.Thedatasetconsistsof4788screenshotfilesextractedfromtheforum’sdiscussionthreadsandcoversafive-yearperiod,from2009toMarch2013.Itamountsto819.69megabytes(Mb)ofdataandcanbedownloadedfromhttp://darkode.cybercrime-tracker.net.Thefilesareorganizedinfoldersthatreflectthestructureoftheforum’ssections:postsincludeamembershiplist,productsforsale,transactionreportsaboutnewproductsofferedtothecommunity,malwareanalysisreports,tutorialsandprogrammingtips,questionsaboutspecificproblems,anda“Hallofshame”sectionwherecomplaintswereairedandconflictswereadjudicatedbytheadministrators.ThismaterialisinthePortableNetworkGraphics(PNG)fileformat,soweattemptedtobatchprocessthedatabaseusingpowerfulOpticalCharacterRecognition(OCR)programsandcustomizedsolutionsofferedbycomputersciencecolleagues.Unfortunately,noneoftheseautomatedtechniquesforcontentanalysisweresuccessful,forcingustomanuallyparseandcodeeveryimagetoextracttheinformationitcontained.Figure1illustratestheappearanceofatypicalscreenshot,whereonlythefilenameissearchable.Eachdiscussionthreadcontainsmultiplecontributionspostedbyforummemberswhosealias,membershiplevel,accessiondate,numberofposts,reputationlevel,andlocationarepublished,althoughthislastpieceofinformationisnotablyunreliable.NoteforexampleMafi’slocationinFigure1’sfirstmessage:“Siberia,Igloo36b”,althoughhewaseventuallyfoundtoliveinSweden.[INSERTFIGURE1.ABOUTHERE] Forthispartofourstudy,aftercarefullyconsideringthequantityofpostsavailableforanalysis,theresourcesatourdisposal,andtheneedtobetterunderstandthemembershipofthisforumanditsstructure,wedecidedtofocusinitiallyonasubsetofdiscussionsthatseemedtoprovidethebestinformationtoeffortratio:theintroductionsprovidedbyaspiringnewmembers.Asdiscussedabove,Darkodewasaninvitation-onlyforum.Onceaprospectivememberhadsecuredaninvitationfromoneoftheforum’sexistingmembers(whousuallyreceivedanallowanceoftwoinvitationsbutcouldalwaysreplenishthembyaskingtheadministrators),he(asmemberswereexclusivelymale)wasadmittedtotheunverifiedsection(Level-1)wherehehadtocompletetheverificationandaccessionprocessbyintroducinghimselftothecommunity.AsoutlinedinapostbySp3cial1stfromJuly2010(seeFigure2),introductionswereintendedtohighlighttheskillset,recentexperience,ongoingactivities,andmotivationsofanapplicant.Aswell,candidatesusuallydisclosedwhohadinvitedthemtojointheforum.Forpeoplewhohadnopriorcontactsinthecommunity,aninterviewwithtrusted

Page 8: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

8

members(Level1or2intheforumhierarchy)wasalsorequired.Eachintroductionwasthencommentedonbyexistingmembers,whoassessedthevalueofthecandidateandvotedtoacceptorrejecttheapplication.Thesecommentsoftenrevealpriorcollaborationsandbusinessexchangesbetweenthecandidateandestablishedmembers,usuallycarriedoutonotherundergroundforums.TheintroductionsandthediscussionsthatfollowthusoperateasatypicalrecruitmentinterviewwhereahackeruseshisintroductorymessagetoprovideacriminalCVthatmustconvincepotentialco-offendersofhistechnicalandbusinessworth,whiletheresultingevaluationsrevealpriorcriminallinks,aswellasthecurrentpreferencesandneedsofthislargecommunityofelitehackers. Onceaccepted,newmembers(designatedasFreshFish,probablyinreferencetoaslangtermusedsincethemid-18thCenturytodescribenewprisoninmatesandpopularizedinthe1994movieTheShawshankRedemption)gainedaccesstoLevel0oftheforum,wheretheycouldbuycertainproductsandparticipateinvariousconversations.Aftertheyearnedthetrustoftheirpeers,theywereadmittedtoLevel1,wherebusinessdealingswerelessrestricted,andeventuallytoLevel2,openonlytohighlytrustedmemberssuchasadministratorsandinfluentialhackers.Inoneoftheadministrator’sownwords,“thepointofthelevelsystemistobelessstrictontheinvitation,wheremorepeoplewillhaveachancetocontributeandeventuallybecomelevel1”(Mafi),whileatthesametimeshieldingthemostsensitivecontentsandtransactionsfromnewentrantswhosetrustworthinesswasuncertain.However,inathreaddiscussingalimitedleakbyXylitolinOctober2012,oneofthecommentersremindedhispeersthatsucharigidhierarchyprovedhardtoenforceinpracticewhenparticipantswantedtoexpandtheirmarket:“everyoneselltheirproduct’sintothelevel0lol…level1/2usersmuststopmakingsalesintothelevel0systemandtostartfinallytobeactiveintothelevel1”(Pwdot).Asthesameuserstatedmorebluntlyinafollow-uppost,“themainideawastoseparatethegoodmembersfromthedumbassandtokeepsecurethewholeforum...butinsteadofthat,everyonemovedintolevel0keepingdeadthelevel1section.”[INSERTFIGURE2ABOUTHERE] Theintroductionsectionoftheavailabledatacontains344applications(476screenshots)fromnewprospectsorformermemberswhohadremainedinactiveforextendedperiodsoftimeandhadtobere-accreditedbythegroup.Thecodingwasdonemanuallybytworesearchassistantswhousedacodebookdesignedbytheprincipalinvestigatorandreviewedeachother’sworkforconsistency.Ambiguousmaterialwasdiscussedwiththeprincipalinvestigatorandthecodebookeditedaccordinglytoensureinternalhomogeneity(Saldaña,2009:21).Eachofthe344applications(seeFigure3foranexample)wasprocessedasasingleeventandenteredintoacodingdatabasewherewerecordedthealiasofthecandidate,thememberwhosponsoredhim,hisparticipationinotherforums,thetechnicalskillsheclaimedhehadmastered,hisbusinessinterests(forexample,whetherhewasasellerorabuyer),hismotiveinjoiningtheforum,andtheproductshewasofferingtotradewithothermembers.Wealsocodedeachresponsetotheseinitialintroductions,inwhichexistingmemberswelcomedcandidates,askedthemquestionsortoclarifyspecificskillsorexperience,orpubliclydiscussedthepotentialvaluethataprospectivememberwouldbringtothecommunity.Foreachcomment,werecordedthenicknameofeachmemberwhoparticipatedintheevaluation

Page 9: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

9

process,thenatureofhisassessment(whathadtriggeredapositiveornegativecomment),aswellasthegeneraloutcomeoftheapplication.Overall,thereare404discretealiasesinourdatabase(344candidatesand60“historical”members).Inotherwords,wetriedtosimultaneouslycapturethequalitativeandquantitativedimensionsoftheseinteractionsinordertounderstandhowthisgroupofhackersselecteditsmembersandwhatfeaturesmentionedbyrecruitswereparticularlyvalued.Wethenusedthisdatasettoperformtargetedqualitativeanalysisconcerningsomeindividualsandproductsthatappearedtobeofparticularinterest.Inthefollowingsection,wedescribethemainargumentsusedbyapplicantstogainacceptanceintothiscommunity,aswellasthetypesofresponsesgeneratedbydifferenttypesofskillsandexperience.[INSERTFIGURE3ABOUTHERE] Whathackerstalkaboutwhentheytalkabouthacking:PresentationalstrategiesThedetailedcodingofintroductions,whichwereverydiverseinlengthandformatalthoughtheygenerallyfollowedthescriptoutlinedbySp3cial1stinFigure2,followedaninductiveprocessadaptedfrompreviousworkonreputationandtrustworthinessinonlinecybercrimeforums(Dupontetal.,2016).Intheiranalysisof25,000reputationratings,Dupontetal.(2016:14)identifyfivecategoriesoffeedbackthatjustifypositiveofnegativeratings:thelevelofsatisfactionwithapastbusinessrelationship,thetypeofgeneralcontributiontothecommunity,aspecificbehaviordirectedatthefeedbackprovider,thequalityoftechnicalskills,andsarcasm.Afirsthigh-levelreadingoftheintroductionsledustoremovethe“sarcasm”category,irrelevantinthatcontext,andtomakeminoradjustmentsthefourothercategoriestoclassifythesignalsoftrustworthinesssentbycandidatestothecommunity:whotheyknewintheforum(sponsors),mentionsoftheirtrackrecordonotherforumsorwithparticularhackingteams(experience),adescriptionoftheirhackingabilities,intermsofbothuniquenessandrelevance(technicalskills),andtheroletheyexpectedtoplayinthemarket(businessinterests).Whentheinformationwasavailable,wealsorecordedthetypesofmalwareandservicestheywereselling.Weusedthesamecategoriestoclassifyresponsesbyestablishedmembers,whichallowedustocomparewhatapplicantsthoughtthecommunityvaluedmostwithwhatactuallyattractedattentionorscornfromactivemembers.Table1providesthedescriptivestatisticsforthedistributionofintroductionsacrossthefourcategoriesdescribedabove.Inthenextparagraphs,weprovideadditionaldetailsoneachofthosefourdimensions,frombothcandidatesandestablishedmembers’perspectives.Toillustratehoweachcategoryoftrustworthinessargumentwasusedbyapplicantsandwhattypeofresponsesitelicited,weselectedanumberofquotesthatwebelievearemostrepresentativeofoursample,evenifsuchclaimsarealwayssubjectivewhenqualitativedataisanalyzed.Beforewegoanyfurther,weshouldnotethat,amongthe277applicationstojointheforumforwhichweknowtheoutcomewithcertainty,94.5%weresuccessful,whichwascounterintuitiveconsideringtheclaimstoexclusivitymadebyDarkodeadministrators.[INSERTTABLE1ABOUTHERE]

Page 10: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

10

Sponsors:90.7%ofintroductionstotheforummentionthenameofthesponsorwhoprovidedtheinitialinvitation,reflectingtheimportanceofpersonaltiesinadmissiontothisgroup.Veryfewofthecandidatesprovidemoredetailedcontextualinformationthatrevealsthenatureoftheselinkages,butasmallgroupofforumadministratorsappearedtoberesponsibleforalargeshareofsponsorships.The286introductionsthatacknowledgeinvitationsmention119Darkodemembers,withanaverageof2.4invitationsconvertedintoapplicationsperreferrer(median:1,range:1-46).However,thefourmostinfluentialrecruiters(Sp3cial1st,G0dlike,Mafi,andFubar),whowerealsoforumadministrators,accountedfor38%ofinvitations.Withouttheirconstanteffortstopromotetheforumandscoutpotentialnewmembers,thegrowthofthisnetworkthroughregularmembers’referralswouldnothavebeensufficienttosustainthecommunity’sexpansion.Forexample,highprofilememberssuchasGribodemon,Paunch,orBx1broughtinonlyacoupleofnewmemberseach,focusingtheirenergiesonmarketingtheirownsuccessfulproductsratherthanongrowingthecommunityofpurchasers.Althoughtrustworthinesswasthemostfrequentlycitedargumentforadmittingorrefusingmembership,veryfewmembersassessingnewcandidatescommentedontheidentityortrackrecordoftheirsponsor(amere19.5%),seemingtotakethetransferabilityoftrustworthinessforgranted.ThefollowingquotefromaLevel1memberperfectlysummarizesthisvicariousformoftrust:““Iwasinvitedherebymafi.”ugotmewhenIsawthis.thisguysoundscool”. Technicalskills:Thesecondstrategytogainacceptancewastodemonstrateone’spotentialcontribution,withparticularemphasisontheuniqueandrelevanttechnicalskillsthatdifferentiate“scriptkiddies”fromthemoreadvancedprogrammerswhodesignandbuildthemalwareusedbytheformer.69.5%ofapplicantslistedtheirtechnicalskills,withamajorityclaimingtohavemasteredgenericcodingtechniquesandcommonprogramminglanguagessuchasC/C++,Javascript,Python,orPerl(60%),whileasmallergroupadvertisedmorespecializedskillssuchasreverseengineering(12%),obfuscationandencryptiontechniques(6%),sqlinjection(5%),ortraffictheft(2%).Interestingly,onlysevencandidates(2%)claimedtheyhadtheexpertisetofind0-dayexploits,thehighlyprizedundisclosedvulnerabilitiesagainstwhichnocomputersystemisprotected(Bilge&Dumitras,2012).Technicalskillsargumentselicitedonly15.1%ofcomments,usuallytoconfirmthatacandidatehadindeedprogrammedcertainproductstothesatisfactionofexistingmembers,sometimesnotingtheoutstandingqualityofthecodedelivered. Experience:Beforetheyapplied,manycandidateshadbeenactiveonothercybercrimeforumsandusedthesetypesofexperiencetogainadmissiontoDarkode,especiallywhentheyhadworkedtheirwayupandheldverifiedstatusoradministrativerolesinotherforums.Somecandidateswhohaddevelopedandmarketedpopularmalwarealsomadesuretomentiontheseintheirintroduction.Experienceaccumulatedonotherforumsorsellingparticularproductswasmentionedin49.7%ofintroductionsandtriggeredthelargestshareofresponses(48.5%),oftenconfirmingthataparticularmemberusingthesamealiashadbeenactiveonsaidforumandhadbehavedreliably.Theexperiencefactorwasthecontentcategorythatresonatedmostwithexistingmembers,whoseemedtobereassuredbythefactthatacandidate’strackrecordcouldbeverifiedindependently. Business:49.4%ofcandidatesincludedintheirintroductionthetypesoftransactionstheyexpectedtoconductonDarkode,eitherassellersorbuyersofproducts,services,orstolendata.

Page 11: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

11

Buyerssignificantlyoutnumberedsellers,with31%ofapplicantswhoemphasizedbusinesscredentialsidentifyingthemselvesassellersand69%asbuyers.Productslistedasavailableincludedbotnets,malwaretools,databasesofstolenpersonalinformationoraccounts,proxyservices,encryptionsolutionstoevadedetection,aswellInternettrafficthatcouldleadtocriminalexploitation.Mostbusinessstatementsmentionedspecificproductsthatcouldbeobtainedfromthemorthattheywereseekingtobuy.Forexample,ExmanoizeclaimedinhisintroductiontobethesellerandauthoroftheEleonoreexploitkit,whichbecamepopularamonghackersin2009(Chen&Li,2015).Suchstatementswouldseemtobebeneficialbecauseacandidatewhohadestablishedarecognizedbrandthroughapopularproductcouldincreasehischancesofbeingacceptedintothecommunitythroughpublicsupportfrompastcustomers.Lessthanonefifthofcomments(18%)addressedthesebusinesscredentials,oftenbyconfirmingthatamemberhadsmoothlyconductedtransactionswithanapplicantandthattheproductsandserviceswereoftheadvertisedquality.Thepurchasingpowerofpotentialnewmemberswasalsoahighlyratedfeature. Hence,whilecandidatestriedtoearnthetrustoftheirpeersbyassociatingthemselveswithestablishedparticipants,showcasingabroadpaletteofattractivetechnicalskills,andleveragingreputationalcapitalaccumulatedonotherundergroundforums,existingmembersseemedmostresponsivetotheFreshFish’spreviousexperienceandtheirbusinesspotential.Butintheend,thesefourpresentationalstrategiesdidnotseemtoenableverydiscriminatoryselectionpatternsamongvotingmembers,consideringthatonly7%ofcommentsintheintroductionswereviewedexpresseddistrust.Asaresult,avastmajorityofapplicantsweregrantedaccesstoDarkodeandallowedtointeractwithhighprofilehackerseagertoexpandtheircustomerbase.ThebusinesschallengesfacedbyprolificsellersOnceadmittedtotheforum,Level0membershadtheopportunitytobuy,sell,andtradeabroadrangeofcybercrimeproductsandservicesandtocommentontheirqualityandaffordability.Theywerealsofreetoparticipateintechnicalproblem-solvingconversationsorinoff-topicdiscussionsaboutaverybroadrangeofsubjects,fromhighprofilearreststopornography,psychoactivesubstances,religion(whenRamadanstartedforexample),orevenArea51,thesecretmilitarybaseintheNevadadesert.Aswell,administratorsorganizedhackingchallengesthatallowedmemberstodisplaytheirtechnicalskills.Inthissection,wediscusstwoareascloselyconnectedtotheday-to-dayoperationsofthisillicitmarketandshowhow,despitetheselectionproceduredescribedabove,whichlookedexactingonlyinappearance,manyinteractionsbetweenbuyersandsellersweredysfunctional,underminingtheperformanceofthemarket.WestartbyanalyzingthetradesconductedbyBx1andcomparetheoutcomeofoneofhislargesttransactionswiththefinanciallossesattributedtohimbytheJusticeDepartment.Weselectedthisparticularmemberforthreemainreasons:hewasatthetimetheprincipalmarketerforoneofthemosteffectivebankingmalwareeverdesigned(Kirk,2011),maintainedaveryactiveprofileontheforum,andwassubsequentlyarrested,prosecutedandsentencedbytheU.S.government.ThisproducedarichtrailofpubliclyavailablelegaldocumentsthatmadethecomparisoninterestingbetweentheinteractionshehadonDarkodewithco-offendersandhowhiscasewaspresentedtopublicopinion.Wethenshiftourfocusfromthetradersoperatinginthismarkettotheproductsbeingexchangedin

Page 12: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

12

ordertohighlightthespecificchallengesassociatedwiththesaleofhackingtoolstomalicioushackerswhooftendonothesitatetoleakthem,therebycompromisingthebusinessopportunitiesoftheirdesigners.Toillustratethispoint,weusetheexampleofCrimepack,apieceofmalwaredevelopedandmarketedbyoneofDarkode’sadministratorsthatwasleakedshortlyafterthereleaseofatechnicalupdate.Thiscasestudyshowshowevenoneoftheforum’smostpowerfulmemberscouldnotpreventothersfromundermininghisbusiness.WhatcriminalachievementlookslikefromtheU.S.GovernmentandDarkode’sperspectivesBx1wasoneofthemostactiveandsuccessfulmembersoftheDarkodeforum,wherehesoldapopularbankingtrojancalledSpyEyethathehadhelpeddevelop.SpyEyestoletheonlinebankingcredentialsofitsvictimsandhijackedwebsessionssothatitsoperatorscouldeasilyandstealthilytakeovertheirvictims’accounts.Althoughsuchnumbersarealwayshighlycontroversial,theU.S.JusticeDepartmentestimatedthatSpyEyehadinfectedmorethan50millioncomputers—targeting253discretefinancialinstitutions–andhadcausedclosetoabilliondollarsinfinancialharm.KnownasthesmilinghackerforhisrelaxedattitudeinpicturestakenfollowinghisarrestbytheThaipoliceon5January2013,whilehewasintransitfromMalaysiatoAlgeria,Bx1’srealidentitywasrevealedtobeHamzaBendelladj,a24-year-oldAlgeriannational(Krebs,2013).HewasextraditedtotheU.S.inMayofthesameyear,pleadedguiltytoall23countsofhisindictment,andwassentencedto15yearsinjailinApril2016(U.S.Attorney’sOffice,2016).EvenifhewasnotSpyEye’smaindesigner,heplayedaninstrumentalroleindevelopingcustomizedmodulesandmarketingthemalware.HealsousedSpyEyehimselftocollectlargequantitiesofstolenbankingcredentials,whichhealsosoldonDarkode. ThesentencingmemorandumfiledbytheU.S.AttorneyprovidedadetailedaccountofBendelladj’sdealingsandrequestedanexemplarysentencebasedonincurredfinanciallossesestimatedtohavereached$100million.TheDepartmentofJustice(DOJ)arrivedatsuchanimpressivenumberafterhavingrevealedthatBx1’sseizedlaptopscontainedmorethan200,000fullcreditcardrecords(includingnumbers,owners’nameandaddress,andcardCVV–thethreedigitsecuritynumberfoundatthebackofthesecards)andthathehad“cashedoutmillionsofdollarsstolenfrombankaccountsacrosstheworld”(Hornetal.,2016).Althoughthesentencingmemorandumnotedthatcreditcardissuersandbankshaddocumentedonlyabout$3.25milliondollarsinattemptedfraudand$878,000ineffectivelosses,theU.S.Attorney’sOfficestillappliedsentencingguidelinesthatvaluedlossesataminimumof$500percard,producinganimpressiveglobalamountthatwouldcaptureanyjudge’sattention.AcloserlookatthediscussionsinitiatedbyBx1andhispeers’responsesillustrateclearlyhowsuchcalculationsmighthavedistortedtheprofitabilityofhisbusinessandbeenmisleading. On3December2011,Bx1startedathreadontheforumadvertisingthesaleofafreshlyhacked“shopadmindatabase”containingmorethan140,000orders.A“shopadmin”isthecommontechnicaldesignationofawebinterfaceusedbyonlinemerchantstomanagetheirstore,keeptrackofcustomersandtheirorders,andmanagepaymentsanddeliveries.MostordersinthisdatabasewereshippedtotheU.S.andCanada,soBx1wasabletoofferhighlyvaluedcreditcardnumbersfromthosetwocountries,includingtheirexpirationdate,CVV,anassociatedbillingandshippingaddress,andtheemailandpasswordusedbycustomerstoregisteranaccountonthecompromisedwebsitefromwhichthedatahadbeenstolen.

Page 13: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

13

AskedbyaLevel2memberwhatthestartingbidforthisdatabasewas,Bx1suggestedopeningthebiddingat$20,000.ThisisfarlessthanwhattheDOJformulapresentedabovesuggestsastheprojectedprofitsthatcanbegeneratedfromthesetypesoffrauds.UnfortunatelyforBx1,thefirstoffermadebyaforummembernamedDonchichoseriouslydampenedhisinitialhopes,offering$300forthewholedatabase.Bx1repliedthat:“ifIsell0.5$eachcc[creditcard]Iget50kguaranteed.”EvenifweignoreBx1’sshakymath,wearestillfourordersofmagnitudebelowtheDOJ’scalculationsfortheaveragefinanciallossassociatedwithastolencreditcard.SwayedbyBx1’splea,MrGold,anotherLevel2member,madea$2,000bid,whichwaspromptlyrejectedondifferentgrounds:“Itested6outof160kDiffe[different]Dates.Meansfrom2008-2011.Andallapproved.IcantestforinterestedbuyerandIshowthemVIATeamViewer[asoftwareallowingdesktopsharing].”Butthisargument,intendedtohighlightthequalityandreliabilityofthestolendata,wasinturndisputedbySven,aLevel2member,whoexplained:“Youcantest100and100outof100work.Whenyouuseabout6-8kofthetotal160k,allbase[anti-fraudbankingdatabases]willgonutsandyouget~20%approvals.”PerhapssensingBx1’sweakeningnegotiatingposition,MrGoldmadeafinal$3,000offer.ItmayverywellbethatanotherhackereventuallyconcludedamoregenerousdealwithBx1throughprivatechannels(acommonoccurrence),buttheexchangesbetweensellerandpotentialbuyersonthisthreadstillgiveasenseofthewildlyfluctuatingpricingmechanismsatwork,whichprobablyreflectthedifficultyofcashinginonthesetypesofstolendatabases. ThechallengefacedbyBx1wasnotonlytoobtainthepriceheexpectedforthestolendatabutalsotomaintainthesatisfactionofhisclientsand,byextension,hisreputationasareliablehackertodobusinesswith.Inanenlighteningexchangestartedon27May2011,Bx1advertiseda“spreader,”apieceofsoftwarethatautomatesthedisseminationofmaliciouscodeneededtoenrollvulnerablemachinesintoabotnetthroughpopularonlineservicessuchasFacebook,Twitter,Gmail,orHotmail.Afterafewflatteringcommentsfrommembersnotingtheeffectivenessoftheproductforsale,theconversationtookamorepersonalturnwhenSolotech,aLevel1member,complainedthathehadnotreceivedthemostrecenttechnicalupdateforthisspreader,towhichhefelthewasentitled.Additionally,hevoicedhisdispleasureaboutBx1’sunresponsiveness.Lessthantwelvehourslater,Bx1’sansweracknowledgedthathehadindeednotsenttheupdatebutthatthisdecisionhadbeenmotivatedbySolotech’sveiledthreatstopubliclyreleasethecodeofthespreader,whichwouldhavethreatenedBx1’sbusiness.ThisspurredGonzo,anadministratorwhohadpositivelycommentedonthemalwareforspreading“likeAids,”tocometoSolotech’sdefense:“Bro,IknowSolotechforawhilenow.Heisastandupguy,maybehewassayingthatoutofanger.”Anotheradministrator,Sp3cial1st,tookamoreconfrontationalapproachtowardBx1:“Beenwaitingapprox1weekforareplyfromyoubx1!Messagedyouwithsomequestionsabouthowitworksandsoforthbutnoreply.”By25June2011,athirdadministrator,Fubar,hadalsopubliclytakensideswithSolotech,tryingtojustifyhiserraticbehaviorbythefactthatSolotechhadpurchasedtheoriginalversionofthismalwarefromanotherhacker(Jam3s)withexclusiveuserightsfor$10,000andwasirritatedtofindoutBx1hadtakenoverthisprojectandhehadtopayanextra$1,500forthenewerandmorestableversion.Meanwhile,potentialbuyers’queriesweredrownedoutintheintensifyingexchangestryingtoassessthevalidityofBx1andSolotech’sarguments.Inotherwords,whatstartedasaroutinemarketingpostmorphedintoapublicdiscussiondebatingthelegitimacyofBx1’sbusinesspracticesandquestioninghiscommitment

Page 14: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

14

tocustomerservice.ApostfromTuxreflectedthatfrustration:Willyoubebackbytheendofthisyear,causeIrememberwhensimilarmemberssaidgoingtovacation…andtheydisappearedforlike4-7monthscausingmealotofpainintheasswhiletimetocompletebusinesswouldn’ttakemorethen30minutestomaxcoupleofhours.Inthattimetheywererelaxing,swimmingorgettinghighIlostallotofmoneyIcouldearn,basicallyIhadopportunitycostcauseoftheirvacation…

Bx1’spositionhadshiftedtoadefensivepostureinwhichhewascompelledtojustifyhisbusinesspracticesandclarifyhisdisputewithSolotechinordertomaintainhisreputation.Alengthypostdated2July2011,summarizesthisdamagecontroloperation: Iaskedaboutu[Solotech]and1/10saysu’regoodrestallsaysNo.AndIstillhaveyourconversationwhenyousaidYougonnamakeitpublicandIdon’ttakeshitofthis.…Youcanpostmeonscammer[alistofuntrustworthytraders]oranywhereyoulike,everyoneknowsmehereIgaveallwhattheypurchaseandalsoIwasgivingthemgiftsinvcc’ssales[virtualcreditcards]andifIdidn’tthatorscamsomeoneheposthereorpostmeonscammer,andifanycoderisonmyplacehewilldosamelikeme.Justletsseepeoplewhattheysay.Guysjustsay,Doyougivesomeoneupdateifhesayshegonnamakeitpublic?YesorNo

Nohonoramongthieves:leaksandthedilemmasofprotectingcybercriminalintellectualpropertyThisfinalquestionisnotarhetoricalone,astheleakingofproprietaryhackingsoftwareisacommonoccurrencethatunderminestheprofitsofmalwaremarketers.Mafiforexample,theforumadministratorindictedintheJuly2015takedown,complainedbitterlytothecommunityon26September20101abouttheleakofhisownCrimepackexploitkitontheContagioMalwareDumpblog:2 Crimepackleak? Whatthefuckistheproblemwithyouguys?Theonlypeoplethathaveversion3.1.3ispeopleonthisboardandhowcomeasecurityresearchergetsaholdofacopyofit?YouguysbetterstartactingasfuckingprofessionalssometimealltheleaksofCrimepacksofarhasbeenthankstopeopleonthisforumandwearesupposedtoholdahigherfuckingstandard.IsupposeinthefutureIwillonlybeabletosell&giveupdatestoverylimitedpeopleandruleouttherest.

Theconversationthenproceededtotrytoidentifythesourceoftheleak,withthepossibility

Page 15: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

15

beingraisedthatamolehadinfiltratedthegroup.Amoredisturbingexplanationwasthepossibilitythatoneoftheforum’smembershadbeencompromised,somehowdiscreditingthemythologyofDarkodeasanexclusivecommunityofelitehackers.Mafihimselfwasnotexemptfromquestionsabouthisoperationalsecurityskills,onemember(TheRogue)asking:“Whydidn’tyouputvarioustagsinthecodeandsuch?Likerearrangeblocklistorsomething.Thenwhenthey[securityresearchers]postinfo,youcantellwholeakedit?”Sp3cial1stalsomadehisdispleasureknowninnouncertainterms:“Iliterallyjustgotaroundtofinallyfuckinguploadingandinstallingthenondomainlockedcrimepackandnowitisbasicallyuseless.Goddamitsomeoneneedstobefuckingmurdered!”Toreassureforummembers,Mafistressedthattheobfuscationtechniqueheusedshouldpreventsecurityresearchersfromlearningtoomuchaboutthemalware’sfunctionsandthatitthereforeremainedausefulhackingtoolworthpurchasing.Andindeed,thiswassubsequentlyconfirmedbyacademicresearcherswhonotedthatCrimepackhadbeenencodedusingaveryeffectivecommercialprotectionsoftwarecalledIonCube(KotovandMassacci,2013).However,asaresultoftheuncertaintycreatedaboutthesourceoftheleakandtheneedtopreventfurtherexposure,Mafilimitedthedistributionofupdatestoafewtrustedcustomers,therebyrestrictingnewsalesopportunitiesandprofits.Furthermore,numerouspostsdiscussedwhocouldhavebetrayedMafi’strust,howhecouldbeidentified(someonesuggestedthatthelistofCrimepackbuyersshouldbedisclosedandthentherewouldbeavoteonpotentialsuspects),whathismotivationswere(greedorstupidity),whetherfederalagentswereinvolvedintheforum’sinfiltration,andhowthepotentialsuspectshouldbedealtwithonceidentified(somecalledfor“goodoldfashionrussiandismemberment,”whileothersfeltmoreforgiving,recommending“rapehimalittle”). Evenifoneshouldnotinterpretthecontentsofthesepoststooliterally,thesenseofdramaandparanoiacreatedbythiskindofbusinesstransgressionsandtheiraftermathproveddetrimentaltotheeffectivefunctioningofthismarket.Thesituationbecamesoproblematicthata“noleaking”policywasannouncedinMarch2011byGodlike,oneoftheforum’sadministrators: Leakingwillnotbetoleratedanymore.Pleaserespectmemberswork. Whenyouleak,youmakeauthorsthinkagainbeforereleasingtheirtools.Ifyoudecidetoleakyouwillbebannedwithoutwarning,thisappliestotoolsthatwilleffectmembersoftheforum.

Predictably,inanumberofpoststhatgrewexponentially,somememberswonderedhowthisnewpolicywouldworkasthecomplexityofdesigning,implementaingandenforcinganeffectiveanti-leakingpolicybecameobvious.Thequestionsthatweredebatedamongmembersincludedthefollowing,withadministrators’answersinparenthesis:WouldthebanbecomprehensiveorlimitedtoactivitiesonDarkodewhiletoleratingleakingonotherforums?(Noclearanswer.)Wouldthepolicystillbeenforceableonceleakedmalwarehadbeenwidelydistributedbyothers?(Yes,inordertoavoidpubliclydisrespectingmembers.)Shouldmalwareprogrammedbymembersofbeginners’forumsbeexemptedfromthenoleakingpolicy?(Yes.)Ifyes,whatwouldhappeniftheirdeveloperswereinvitedtojoinDarkodeatalaterdate?(Theleakwouldthenberemovedfromtheforum.)Thesequestionshighlightedtheinherenttensionbetweenhackers’naturalpropensitytoprobe,reverseengineer,anddisclosesoftwarecode,on

Page 16: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

16

onehand,andtheneedforanymarket,includinganillicitonewithrestrictedaccess,toadoptandenforceregulationsprotectingtheintellectualpropertyrightsofsellers,ontheother.ThefrustrationexpressedbyDarkode’sadministratorsreflectedthechaoticnatureofexchangesinthisparticularcommunity. Conclusion

This paper’s primary contribution is to analyze the outcomes of an elite hacking forum’sselectionprocess,andtodevelopabetterunderstandingofhowtrust isestablished inonlinemarketswhereparticipantsarevettedbytheirpeers.This is the first time, to thebestofourknowledge,thatdataaboutsuchanexclusiveandclosedgroupofcybercriminalsisexploredindepth.However,wedidnotanticipatethatwewoulduncoverasituationwherethevastmajorityofcandidateswereletinforprofitpurposes,incontradictionwiththedisciplinedandsecurity-mindedimageprojectedbytheforumadministrators.Despitethedetailedadmissionproceduresdesigned by administrators, the forum seems to have faced the same trust and reliabilityproblemsasthosedocumentedinpreviousresearchonpubliccybercrimechannelsandforums(HerleyandFlorêncio,2010;HoltandLampke,2010;Yipetal.,2013b;Dupontetal.,2016).Basedontheevidencederivedfromapartialanalysisofthisdataset,wefindahighacceptancerate(94.5%)fornewmembersthatcontradictsthenarrativeofaneliteforumaccessibleonlytohighlyskilledhackers.Providedthatacandidatewasabletoobtainaninvitation—andadministratorsmade sure that many were extended to members of less-exclusive forums (MalwareTech,2014)—the chances of gaining entry were overwhelmingly positive. This unexpectedly highacceptance ratewas sustained to a large extent by the belief that a proven track record onanotherhackingforumandawillingnesstoconductbusinessonDarkodeweremoredesirablefeatures thantheability todemonstrateadvancedtechnical skills,ademandthatwouldhaveproducedmorediscriminatoryoutcomes.Analysisofintroductionsconfirmedthatamajorityofapplicantsclaimedtohavemasteredonlyverycommonprogrammingtechniquesandthatmorecomplexskillssuchasobfuscation,cryptography,andsqlinjectionwereinmuchshortersupply.Asoneof its co-founders candidlyacknowledged, sucha configurationwasalmost inevitable,given a core group of talented hackers designing powerfulmalwarewho needed to find andcultivatebuyersfortheirproducts(Placek,2016).Inotherwords,whentheadministratorshadtochoosebetweenaclose-knitcommunityoftechnicalexpertssharingcommonvaluesandamoreopenmarketcatering tocybercrimeentrepreneurs, theyputprofitsbefore trust,whichpossiblyledtotheirdemise.

Asaresult,anddespitewhatmayarguablyhavebeenthemostelaborateattemptsyetbyanonlineillicitmarkettoshutoutrippersanderadicatedeceptivepractices,trustremainedelusiveandinteractionswereoftenfraughtwithsuspicionandaccusations.Thissenseofparanoiawasmademoreacutebyevidencethattheforumhadbeenrepeatedlyinfiltratedbylawenforcementinvestigators, security researchers, and theoccasional investigative journalist, putting a lot ofpressureonmembers.Manythreadsthatbeganastechnicalandbusinessdiscussionsescalatedrapidlyintosmearcampaignsthatmobilizedconsiderableamountsofenergyandbecamemajordistractions for a community that had been designed initially to improve the quality ofcollaborationamongproficienthackers.So,wedidnotprogressasexpectedinestablishingwhatfeaturesandtraitsenhancethereputationandtrustworthinessofnewentrantsinonlineillicit

Page 17: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

17

markets,butour results suggest that frequentexpressionsofdistrustanddefianceare foundacrossthewholespectrumofhackercommunities,frombeginners’forums(Dupontetal.,2016)toahigh-endmarketsuchasDarkode.Thisinsightisanewcontributiontotheliteraturethatwillneedtobeconfrontedwithfurtherempiricalevidence inordertotest itsgeneralizability.Forexample,caninnovativetechnicalsolutionssuchastheautomatedcryptographic,reputationalandescrowmechanisms foundoncryptomarketsovercomethis trustdeficitandusheranewtransformativeeraofcybercrimeeffectiveness(AldridgeandDécary-Hétu,2014)?Alternatively,dohybridcybercrimenetworksthatblendofflineandonlinesocialtiesprovemoreresilientthantheirpurelyonlinecounterpartsasfarastrustisconcerned(Leukfeldtetal.,2016b)?

ForatraditionalonlineforumsuchasDarkode,oneoftheconsequencesofsuchhighlevelsofdistrustarethedifficultiesandresistancethatevenoneofitsmostsuccessfulmembers,suchasBx1, encounteredwhen he tried to sell his products, services, or stolen data. The estimatedrevenuefromthebigvolumesaleweanalyzeinthispaperprovedtobeverydifferentfromthefinancial loss estimated by the Department of Justice in Bx1’s sentencing memorandum—different by several orders of magnitude.While we acknowledge that our analysis does notincludethecostsoftheharmcausedbytheidentityfraudthatthissalemadepossible,andthatwewerenotabletoperformacompleteanalysisofallthetransactionsconductedbyBx1onthisforumandinotheronlineillicitmarkets,thediscrepancyremainssignificantanddeservestobeinvestigated further in future research, particularly given the lengthy jail sentences that havebeen imposed in similar cases. We have not found in the literature any other contributionattemptingacomparisonbetweenthefinancialharmcausedbyonlineoffendersandtheclaimedharm publicized by law enforcement investigators and prosecutors following high profileconvictions, and we therefore believe that researchers should continue their work onmethodologiesthatproducemorerobustnumbers.

Thequalitativeanalysisofseveralthreadsdiscussingleaksofmalwareandthebestwaystoprevent them highlights how challenging it was for malicious developers to protect theirintellectualpropertyandtomaintainsustainablerevenuestreams.Whiletheystruggledtokeeptheirficklecustomershappy,disloyalcompetitorsorcybercrimewannabesdidnothesitatetocrackcodetheyhadwrittenandshareitforfreeoratbargainprices.Infuturestudies,weplantodigmuchdeeperintothedatatounderstandhowdisputesanddistrustarose,howtheformerwereadjudicatedtolimitthelatter,andwhatwastheimpactonforum’soperations.ThefinancialharmcausedbyDarkodememberswascertainlynottrivial,butresultstakenfromasmallsampleof high profile hackers show that their criminal experiences and achievements divergedsignificantly from themyth of the lone super-hacker (Ohm, 2008) that is often generated bysecurityfirmsandlawenforcementagencies,andobliginglyamplifiedbythemassmedia.Liketheirofflinecriminalentrepreneurcounterparts, their success seemed todependasmuchontheir ability to prevent or overcome the malfeasance, mistakes, or failures (von Lampe andJohansen,2004;Tilly,2005)thatinvariablypunctuatedtheirdealingswithotherhackersasontheirtechnicalexpertise.

Notes

Page 18: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

18

1Althoughthepostisdated26September2010,thefirstmentionofaCrimepackleakinthemediaandonspecializedsecurityblogsappearedonlyinMay2011.Thisdiscrepancymaybeattributabletoadelayinpublicizingtheleakortoatimestampingerror.2http://contagiodump.blogspot.ca

Page 19: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

19

ReferencesAblon,L.,Libicki,M.,&Golay,A.(2014).Marketsforcybercrimetoolsandstolendata:Hacker’sbazaar.SantaMonica,CA:RANDCorporation.Afroz,S.,Garg,V.,McCoy,D.,&Greenstadt,R.(2013).Honoramongthieves:Acommon’sanalysisofcybercrimeeconomics.2013eCrimeResearchersSummit,SanFrancisco,17-18September2013.Retrievedfromhttp://www1.icsi.berkeley.edu/~sadia/papers/ecrime13.pdf.Akerlof,G.(1970).Themarketfor“lemons”:Qualityincertaintyandthemarketmechanism.TheQuarterlyJournalofEconomics,84,488-500.Aldridge,J.,&Décary-Hétu,D.(2014,May13).Notan'Ebayfordrugs':Thecryptomarket'SilkRoad'asaparadigmshiftingcriminalinnovation.Retrievedfromhttps://ssrn.com/abstract=2436643.Allodi,L.,Corradin,M.,&Massaci,F.(2016).Thenandnow:Onthematurityofthecybercrimemarkets–Thelessonsthatblack-hatmarketeerslearned.IEEETransactionsonEmergingTopicsinComputing,4,35-46.BBC(2013,December24).Mariposabotnet‘mastermind’jailedinSlovenia.Retrievedfromhttp://www.bbc.com/news/technology-25506016Best,J.,&Luckenbill,D.(1994).Organizingdeviance.UpperSaddleRiver,NJ:PrenticeHall.Bilge,L.,&Dumitras,T.(2012).Beforeweknewit:Anempiricalstudyofzero-dayattacksintherealworld.InProceedingsofthe2012ACMconferenceonComputerandcommunicationssecurity(pp.833-844).NewYork,NY:ACM.Chen,J.,&Li,B.(2015).Evolutionofexploitkits:Exploringpasttrendsandcurrentimprovements.Irving,TX:TrendMicro.Décary-Hétu,D.,&Dupont,B.(2012).Thesocialnetworkofhackers.GlobalCrime,13,160-175.Décary-Hétu,D.,&Laferrière,D.(2015).Discreditingvendorsinonlinecriminalmarkets.InA.Malm&G.Bichler(Eds.),Disruptingcriminalnetworks:Networkanalysisincrimeprevention(pp.129-152).Boulder,CO:LynneRienner.Décary-Hétu,D.,&Leppänen,A.(2016).Criminalsandsignals:Anassessmentofcriminalperformanceinthecardingunderworld.SecurityJournal,29,442-460.Décary-Hétu,D.,&Giommoni,L.(2016).Dopolicecrackdownsdisruptdrugcryptomarkets?AlongitudinalanalysisoftheeffectsofOperationOnymous.Crime,LawandSocialChange,doi:10.1007/s10611-016-9644-4.

Page 20: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

20

Dupont,B.,Côté,A.-M.,Savine,C.,&Décary-Hétu,D.(2016).Theecologyoftrustamonghackers.GlobalCrime,17,129-151.Europol(2015,July15).CybercriminalDarkodeforumtakendownthroughglobalaction.Retrievedfromhttps://www.europol.europa.eu/content/cybercriminal-darkode-forum-taken-down-through-global-actionFBI(2010,July28).FBI,SlovenianandSpanishpolicearrestMariposabotnetcreator,operators.Retrievedfromhttps://archives.fbi.gov/archives/news/pressrel/press-releases/fbi-slovenian-and-spanish-police-arrest-mariposa-botnet-creator-operatorsFBI(2015,July15).Majorcomputerhackingforumdismantled.Retrievedfromhttps://www.fbi.gov/contact-us/field-offices/pittsburgh/news/press-releases/major-computer-hacking-forum-dismantledFelson,M.(2003).Theprocessofco-offending.InM.Smith&D.Cornish(Eds.),Theoryforpracticeinsituationalcrimeprevention(pp.149-168).Monsey,NY:CriminalJusticePress.Franklin,J.,Paxson,V.,Perrig,A.,&Savage,S.(2007).AninquiryintothenatureandcauseofthewealthofInternetmiscreants.InProceedingsofthe14thACMConferenceonComputerandCommunicationsSecurity(pp.375-388).NewYork,NY:ACM.Glenny,M.(2011).DarkMarket:Cyberthieves,cybercopsandyou.NewYork,NY:AlfredA.Knopf.Herley,C.,&Florêncio,D.(2010).Nobodysellsgoldforthepriceofsilver:Dishonesty,uncertaintyandtheundergroundeconomy.InT.Moore,D.Pym&C.Ioannidis(Eds.),Economicsofinformationsecurityandprivacy(pp.33-53).NewYork,NY:Springer.Holt,T.,&Lampke,E.(2010).Exploringstolendatamarketsonline:Productsandmarketforces.CriminalJusticeStudies:ACriticalJournalofCrime,LawandSociety,23,33-50.Holt,T.(2013).Exploringthesocialorganisationandstructureofstolendatamarkets.GlobalCrime,14,155-174.Holt,T.,Smirnova,O.,Chua,Y.T.,&Copes,H.(2015).Examiningtheriskreductionstrategiesofactorsinonlinecriminalmarkets.GlobalCrime,16,81-103.Holt,T.(2016).Identifyinggapsintheresearchliteratureonillicitmarketson-line.GlobalCrime,doi:10.1080/17440572.2016.1235821.Holt,T.,Smirnova,O.,&Chua,Y.T.(2016).Exploringandestimatingtherevenuesandprofitsofparticipantsinstolendatamarkets.DeviantBehavior,37,353-367.

Page 21: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

21

Horn,J.,Ghali,K.,&Grimberg,S.(2016).UnitedStatesofAmericav.HamzaBendelladj(A.K.A.“Bx1”)CriminalActionNo.1:11-CR-557-AT-2SentencingMemorandum.Retrievedfromhttp://krebsonsecurity.com/wp-content/uploads/2016/04/bx1-gribboSM.pdfHrodey,M.(2015,October12).DarkSide.MilwaukeeMagazine.Retrievedfromhttps://www.milwaukeemag.com/2015/10/12/dark-side-darkode-fbi/Hutchings,A.,&Holt,T.(2015).Acrimescriptanalysisoftheonlinestolendatamarket.BritishJournalofCriminology,55,596-614.Hutchings,A.,&Holt,T.(2016).Theonlinestolendatamarket:disruptionandinterventionapproaches.GlobalCrime,doi:10.1080/17440572.2016.1197123.Kharouni,L.(2015,December1).Darkodereloaded–Newforumgets“F”grade.DayBeforeZeroBlog.Retrievedfromhttps://www.damballa.com/darkode-reloaded-new-forum/Kirk,J.(2011,July26).SpyEyeTrojandefeatingonlinebankingdefenses.Computerworld.Retrievedfromhttp://www.computerworld.com/article/2509482/security0/spyeye-trojan-defeating-online-banking-defenses.html.Koster,M.(1996).Amethodforwebrobotscontrol.Retrievedfromhttp://www.robotstxt.org/norobots-rfc.txtKotov,V.,&Massacci,F.(2013).Anatomyofexploitkits:Preliminaryanalysisofexploitkitsassoftwareartefacts.InJ.Jürjens,B.Livshits&R.Scandariato(Eds.),Engineeringsecuresoftwaresystems(pp.181-196).Berlin:SpringerBerlinHeidelberg.Krebs,B.(2011,October17).Softwarepiratecrackscybercriminalwares.KrebsonSecurity.Retrievedfromhttps://krebsonsecurity.com/2011/10/software-pirate-cracks-cybercriminal-wares/Krebs,B.(2013a,April2).Foolmeonce…KrebsonSecurity.Retrievedfromhttps://krebsonsecurity.com/2013/04/fool-me-once/Krebs,B.(2013b,May3).AllegedSpyEyeseller‘Bx1’extraditedtoU.S.KrebsonSecurity.Retrievedfromhttps://krebsonsecurity.com/2013/05/alleged-spyeye-seller-bx1-extradited-to-u-s/Krebs,B.(2014).Spamnation:Theinsidestoryoforganizedcybercrime–fromglobalepidemictoyourfrontdoor.Naperville,IL:Sourcebooks.Krebs,B.(2015).TheDarkodecybercrimeforum,upclose.Retrievedfromhttps://krebsonsecurity.com/2015/07/the-darkode-cybercrime-forum-up-close/

Page 22: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

22

Leukfeldt,E.R.,Kleemans,E.,&Stol,W.(2016a).Cybercriminalnetworks,socialtiesandonlineforums:Socialtiesversusdigitaltieswithinphishingandmalwarenetworks.BritishJournalofCriminology,doi:10.1093/bjc/azw009.Leukfeldt,E.R.,Kleemans,E.,&Stol,W.(2016b).Origin,growthandcriminalcapabilitiesofcybercriminalnetworks.Aninternationalempiricalanalysis.Crime,LawandSocialChange,67,39-53.Lu,Y.,Luo,X.,Polgar,M.,&Cao,Y.(2010).Socialnetworkanalysisofacriminalhackercommunity.JournalofComputerInformationSystems,51,31-41.Lusthaus,J.(2012).Trustintheworldofcybercrime.GlobalCrime,13,71-94.Macdonald,M.,&Frank,R.(2016).Thenetworkstructureofmalwaredevelopment,deploymentanddistribution.GlobalCrime,doi:10.1080/17440572.2016.1227707.MalwareTech(2014).Darkode–OdetoLizardSquad(theriseandfallofaprivatecommunity).Retrievedfromhttps://www.malwaretech.com/2014/12/darkode-ode-to-lizardsquad-rise-and.htmlMcCoy,D.,Pitsillidis,A.,Jordan,G.,Weaver,N.,Kreibich,C.,Krebs,B.,Voelker,G.,Savage,S.,&Levchenko,K.(2012).PharmaLeaks:Understandingthebusinessofonlinepharmaceuticalaffiliateprograms.21stUSENIXSecuritySymposium,Bellevue,WA,8-10August2012.Retrievedfromhttps://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final204.pdf.Monsma,E.,Buskens,V.,Soudijn,M.,&Nieuwbeerta,P.(2013).Partnersincybercrime.InD.F.Hsu&D.Marinucci(Eds.),Advancesincybersecurity:Technology,operationsandexperiences(pp.146-172).Bronx,NY:FordhamUniversityPress.Motoyama,M.,McCoy,D.,Levchenko,K.,Savage,S.,&Voelker,G.(2011).Ananalysisofundergroundforums.Proceedingsofthe2011ACMSIGCOMMconferenceonInternetmeasurementconference,NewYork,NY:ACM.OfficeforNationalStatistics(2016).CrimeinEnglandandWales:YearendingJune2016.London:ONS.Ohm,P.(2008).Themythofthesuperuser:Fear,risk,andharmonline.UCDavisLawReview,41,1327-1402.Pauli,D.(2013,September12).Theriseofthewhitehatvigilante.ITNews.Retrievedfromhttp://www.itnews.com.au/news/the-rise-of-the-white-hat-vigilante-356543/page0

Page 23: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

23

Placek,M.(2016).DanielPlacekonDarkode.LawfarePodcast,episode157.Retrievedfromhttps://www.lawfareblog.com/lawfare-podcast-daniel-placek-darkodePoulsen,K.(2011).Kingpin:Howonehackertookoverthebillion-dollarcybercrimeunderground.NewYork,NY:CrownPublishers.Saldaña,J.(2009).Thecodingmanualforqualitativeresearchers.London:SAGEPublications.Soudijn,M.,&Zegers,B.(2012).Cybercrimeandvirtualoffenderconvergencesettings.TrendsinOrganizedCrime,15,111-129.Tilly,C.(2005).Trustandrule.Cambridge:CambridgeUniversityPress.Turton,W.(2015,August9).TheyearoftheLizardSquad.TheKernel.Retrievedfromhttp://kernelmag.dailydot.com/issue-sections/features-issue-sections/13941/who-is-lizard-squad-history/U.S.Attorney’sOffice(2016,April20).Twomajorinternationalhackerswhodevelopedthe“SpyEye”malwaregetover24yearscombinedinfederalprison.Retrievedfromhttps://www.justice.gov/usao-ndga/pr/two-major-international-hackers-who-developed-spyeye-malware-get-over-24-years-combinedVonLampe,K.,&Johansen,P.(2004).Organizedcrimeandtrust:Ontheconceptualizationandempiricalrelevanceoftrustinthecontextofcriminalnetworks.GlobalCrime,6,159-184.Xylitol(2013,April1).Darkodeleak.Retrievedfromhttp://www.xylibox.com/2013/04/darkode-leak.htmlYip,M.,Shadbolt,M.,&Webber,C.(2012).Structuralanalysisofonlinecriminalsocialnetworks.InternationalConferenceonIntelligenceandSecurityInformatics,Arlington,11-14June2012.Retrievedfromhttp://eprints.soton.ac.uk/337076/1/yip_isi2012_final.pdf.Yip,M.,Shadbolt,N.,&Webber,C.(2013a).Whyforums?Anempiricalanalysisintothefacilitatingfactorsofcardingforums.ACMWebScience2013,Paris,2-4May2013.Retrievedfromhttp://eprints.soton.ac.uk/349819/1/yip_websci13_final.pdf.Yip,M.,Webber,C.,&Shadbolt,N.(2013b).Trustamongcybercriminals?Cardingforums,uncertaintyandimplicationsforpolicing.PolicingandSociety,23,516-539.Zetter,K.(2015,July15).DozensnabbedintakedownofcybercrimeforumDarkode.Wired.Retrievedfromhttps://www.wired.com/2015/07/dozens-nabbed-takedown-cybercrime-forum-darkode/

Page 24: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

24

Figure1.Darkodescreenshot.

Page 25: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

25

Figure2.Introductionguidelinesscreenshot.

Page 26: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

26

Figure3.Introductionscreenshot.

Page 27: Darkode: Recruitment patterns and transactional features ... · 1 Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”

27

Table1.Frequencydistributionforfourcategoriesofargumentsusedbycandidatesintheirintroductionandbymembersintheirassessment(N=344)Categories Introductions Answersfromexistingmembers % N % NSponsor 90.7 312 19.5 67Technicalskills 69.5 239 15.1 52Experience 49.7 171 48.5 167Business 49.4 170 18.0 62Note:aseachintroductioncontainedsignalsoftrustworthinessbelongingtodifferentcategories,thesumisgreaterthan100%.